Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
150c23f27670a5500ab17ebdaddc6cbc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
150c23f27670a5500ab17ebdaddc6cbc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
150c23f27670a5500ab17ebdaddc6cbc_JaffaCakes118.html
-
Size
211B
-
MD5
150c23f27670a5500ab17ebdaddc6cbc
-
SHA1
7f479dcd2b83ebcd4dbc922066cb5fb5bfc169a9
-
SHA256
aa36f2e7bd22ecee442fd4fe25590048780921e848564d3d21f4ffdcd8245e8b
-
SHA512
81e87c096918eeda8d426f0322bc628851b670762367136b28383cb33581d30b0d84d071901cde6fdf34f3b5c5c2dcb3e2693d4bf4ca251b7501a760429e3cce
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e3aa6942639e8d63eebfc79f889e347b7ea4c24e766bf8b76a5654ab29b0e61d000000000e80000000020000200000005f045f391127b5785b27a73b674ee490d0ed89221206f4aaa9dc21e00f5cab4920000000e2ae1a21e33dd2cb2dc80e697c7471edfd6ef02c39b02c8689cd18a41273720040000000ec9e25b3988cfc423d6382f156dfca67c6e8d1d77ecea93eaa7d6127dff88a2c264966dce642f7c2cbfc5ecf2aec639523785d1c2193a120d44a7e782d2062a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006786f4a716db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434240688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E663FF1-829B-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1084 1972 iexplore.exe 30 PID 1972 wrote to memory of 1084 1972 iexplore.exe 30 PID 1972 wrote to memory of 1084 1972 iexplore.exe 30 PID 1972 wrote to memory of 1084 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\150c23f27670a5500ab17ebdaddc6cbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598208a6fe816244080eeb91ca1da24ed
SHA112d14c53661555cad09ae9abfeb2e0ca36082c0e
SHA256638c365116dc06b1eaa340c066a9db9dc9d2178bd649e9bc583177072d3f56ab
SHA512e8edeef2892019daa2e63121d1d4dea54ecd8f3f6611e1aa24f59446232c2d3d3482ac5718f8e7f76a6232c904ccc77a48f1dd210ad0abf63f3d2945c5c8b1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2204570498d7922ceb3a267b3cf74f
SHA1697f87c80be4dbcbb925f26534b6066c6bf36cff
SHA256b9542f7b751126bf05d340d3ebb919e88f2b275b1c61b395d41d15340c1582c3
SHA512d569e69cf3508f8e863514077014c10274502fb5196a46b4897786c36e8df1d22f7821cebb342b904c34b8f3a42199207469c3ca4e4c867e65b9e91c85a91ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0a067eb2e1f57c3f32781098011541
SHA1b88a17c819cade94fed6b801fc33fa88a8f29046
SHA256cc42e3b2ebafc902209bf9b3e27da8e08dc98f21cdb377f947f55f81a8fb32bd
SHA512b65fbb526650ed863529bb1e28f02da956c50f6734ed5aa5042c474bd6423b2bfbd703960ae33e5fdd375fc63f890336b12ef8ef18761427c6b017aa4df4b4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e993e5c55728286cabb47305af320be7
SHA1243a868e90f7e120e7004f29650ba8b689d614a9
SHA256c25eaee8f88f3a0c1bff92bf80aa200b4e20fa76eab144d9c29a099fb456359b
SHA51282153f5a63ad87bcba243db58b9fb43f1f3c0f7fb4abf6671f72701d952836da3a0e1800eb816b47ef23db0ddcf9d0ec0f9cf21f28afa1462190597916e0c712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57787ce45edfe3293ddc3519cbf35cb72
SHA1418f877e62b003e6a218f5909d12598689015620
SHA256e97bb3e6ad58ab0733db0b44812af07285bcd763919af89eb325e2ad1578c1b8
SHA512b091e2b91efbfd714515696492a2aaa7c16229f85bdd9a481cc78fba7bde7dc4f3faa564cf9762e579688e821854dd60e27b87c8f36bcc41c987eb7329ab08ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33f82c12c8b1738165d2c7d20fa4c10
SHA100f37ebf9ae04a55e47a0926581dd5124987ee91
SHA25649142e78d02d4a9eb599cde058c260dfc25deed82f968b5057dd2285ca34601c
SHA512115b93de51be2134c452424bea6166d8964fd84ef37f1953770087ec77998c9061a47851f2b50e5a17a8456280c6f5cf5ed306eef5458afac5a2c2e1f3645ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc90e302a640166ac485a5c4d27a0701
SHA158577c2de62b9dbfc3efc2d2fc67d645490c6831
SHA2562b30cb3b20716782836bb640160a81df23878c77b2381184943b4a975a48bfa9
SHA512ba96cf31521bfb50da2be33e910435f46fc0e48e08b4f3ce1112cce52d5724abdeea875b532b18a12d40a21ef2519fad31ea88d505c16cc3722417234e103046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7d286a90838bb9525d310737f9e095
SHA12b8273417cc805bc1d16fb651cd9482c7dfd620f
SHA2561ee0549058aa3efab6042b714826e09ad3f0c18facf2d25802f3ea2fda869e4b
SHA51270e3c29fc0b84d7caf223a27fd4bbd56da30cc889a2d4c111322ac9f7ca740dc9fcaf643446535f422ed18bcd115aff4f8a197669deb0b89d50d5cd38c04aefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2e285f2e883882c30729eee9d4638a
SHA14ffbcf90251de67fdc3a7ba634b1c7d4552b2311
SHA25662c091e17fc2fc25b31de334aaf970d82fb20690c375b0bb52e5fb23f754cf85
SHA5128e721c476206872efd9a0509291145243d31f9bbbed41525c8182bcf997348e31bcf4519e76b942af1aa397f8c971ee7223f43dbeb5d0502dd10bdf928b2220a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e381ec84bccadc92851e1268859d74a
SHA1f4bc89e306a2551791a0bd4993147a26ff9a7121
SHA2567cf6364aba40b03cbbeeb6cc59490edafb5bb694880f6a91bace7a854ff70f69
SHA512908f4c72dcea472a5ff98a73420bf086d456979abe305386f8d701816644ec2a2d2df6b5a94e7c5e5d5eaa3c699e5aaa2827c7a15b7c190b898037ffe7aeff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd5d3448b91c146b458157a264a9588
SHA174792a56f9fa961a423be644dee0dc4ff5210fd6
SHA25616a9b3444dacfe22a6c8b5f480607bae9cc3c9c52f0a5d62ca76dd0d10a9dba6
SHA512f4f323a3d0a37c72590cd65579fde0e87361332142fbee980dc47091e74b0f539cf5350c97943b263dc15896ab149722097b1e863529f181367c691348103ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3127256389f4a18b75316d420631a6
SHA1da48eef4400615e8cff30f7358a3f23f6b39110a
SHA2561db02338e7bb4c172bc77c2513851cf33ea65519d5129c612399beed8ba84238
SHA5128d60662cabab1a9045133a5727d1d3aea55ec2e73480fa47e7cfdc0d48e8e6ca61398656d683939c37a646da317fb85fcb98facdadd8b2b3f564b2c7e6cf5378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d534475c2a760a4af018f23ddaec32e4
SHA14c23ded294c1708304cc38eac0377bf06011b31b
SHA256b33761ba960ca24fbd000211f1def188cea6177b148fa0b4294cc977dca86fee
SHA512036ce540bd9bf56772107559aed0eb5401456ec6ba467c3b21b1fe2ce1aa7773c61f4e0e0a6fcacfeed3184f6b2a17a3ab15ce2eea247bb9231ae59a52ee5d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61fc66491c66d92c4b6e948b38b2de8
SHA1323170669c02bdff37f48f5bcba42bab0c07603f
SHA256f030a662227cfb09d5489ec5b694c644007fbf4ade931308270da8cb18b110ea
SHA51283e1ff813eb8abc3e4943455bc0f8f5e0993625fa0e1352f0693bb31973c6c65a745bba258d102ef0bea1bbeb6ebabf93225257a8c3a6d71adbf75d7a8d8a766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404b1bbc211140431c6b91e17380c4d8
SHA165bd81b91d91df5a4ac10d1115338f84ba757704
SHA256ccecefd1bd6ea02d6854ef833e029e3ca31378e33600edf48ff4d978203e3344
SHA512b4425dae77023afce297121d3aaf5f5c5eed6cd923cfbe13bf57475185d72ef5542d3bfd6cf8e9a430621ec43e5ab8d5bf1d14bd5e296544df4c4eec11564b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51421a2896c0286be34b3407adbc97d05
SHA13a8d4c876c8b40c7db5d87fe39cc1a8eaece4a9e
SHA256cd9dc3b18a4e6c92c4232865f2cc4b4d9d5c5c61b2b398642993100676ef1853
SHA51206d57e1b59c2d153a64bf7dc43705777107796fd881bec2b23ad6ae3ab63a6363f101735da206b7a9b7d7e1beb9d6a7a03207756d6f13270b04886d37300416a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abd1ef7b8a03836ecef4dd4e03f83a8
SHA151a15c06156ccf2cfcce4e86e597c9893903cf0b
SHA2564621f42e8059ce234426780416e6ea9aca4e1f3dd405c8a69b9395cabeb0ce96
SHA512417cb95bd9a95066ae4cfb267b10d3377b5bdd9b27d62ce64bfedc5430cfb39bf0343aef909a08367fe54f00845d3f9cbb9706ba9f062828cddfa7f5d15235f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f87a90085c86a5097a71cc96aef01a
SHA1ccfe1b23d623c15973ac25b8e00baf10f3776b54
SHA2567bb647fec1b6df4bded4710dd33f945a31bb5cd8a011ae33e491dfcc59ed450d
SHA512a67cd9c9d54ae20da289a6c3d1f4871d81b58c7cc2335b02e8e65644d892319a3abce8d2cdc2fd9688c3387664c0efefa58292284d25726220a55be4cc2fe1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a0f4f3678e9b50b14775ec8efa47dd
SHA102951da0a14b1e136a58b683622abb1b993b7227
SHA25670af80a0c20f6eda542d1f741c4a1de1ab675ebae0139dc526056763500ed1f5
SHA512a03bade119bd90801bf747fe92c8fc9445cc06b0ecf28f6e22adb383232df08c02bd64b59e5aa4a3c4306a2df2475d026b17d34ee19956d6612ab3703b29d833
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b